Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Learning Joomla! Extension Development: Creating Modules, Components, and Plugins with PHP
Learning Joomla! Extension Development: Creating Modules, Components, and Plugins with PHP
If you're a PHP programmer eager to create extensions for Joomla!, this book is for you. Written for Joomla! 1.5, it gets you coding your first extensions as quickly as possible, and adds features that will make your work look professional! The world's hottest open-source content management system, Joomla! won the 2006 Open Source CMS Prize....
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
    The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

    I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

    Advanced Penetration Testing: Hacking the World's Most Secure Networks
    Advanced Penetration Testing: Hacking the World's Most Secure Networks

    Build a better defense against motivated, organized, professional attacks

    Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

    Hacking VoIP: Protocols, Attacks, and Countermeasures
    Hacking VoIP: Protocols, Attacks, and Countermeasures

    Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

    Beginning Ethical Hacking with Python
    Beginning Ethical Hacking with Python

    Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

    Wi-Foo : The Secrets of Wireless Hacking
    Wi-Foo : The Secrets of Wireless Hacking

    The definitive guide to penetrating and defending wireless networks.

    Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

    Understanding Network Hacks: Attack and Defense with Python
    Understanding Network Hacks: Attack and Defense with Python

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

    The Mezonic Agenda: Hacking the Presidency
    The Mezonic Agenda: Hacking the Presidency
    "Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
    Gray Hat Python: Python Programming for Hackers and Reverse Engineers
    Gray Hat Python: Python Programming for Hackers and Reverse Engineers

    Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

    unlimited object storage image
    Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy